CSX Practitioner Exam Prep Course Training

CSX Practitioner Exam Prep Course Training prepares you for the examination and helps you revise everything quickly. It covers all the five areas (Identify, Protect, Detect, Respond, Recover) and provides you with comprehensive coverage of the concepts and skills.

Category : ISACA

Course Price : $3495 Per Participant

 

Course Details

400+

Courses

15+

Years of Experience

85K+

Global Learners

Course Description

  • CSX Practitioner Exam Prep Course Training prepares you for the examination and helps you revise everything quickly.

    It covers all the five areas (Identify, Protect, Detect, Respond, Recover) and provides you with comprehensive coverage of the concepts and skills.

    This training is specifically designed for the IT field operating in the cybersecurity area, having 1 to 5 years of experience.

    Professionals operating in the C-Suite who take business and funding decisions that affect cybersecurity can also benefit from the Global cybersecurity frameworks.

    CSX Practitioner Exam Prep Course Training helps you acquire critical skills by learning cybersecurity concepts and practices.

    It grooms your skills and clears all your queries. During this technical course, you go through advanced cybersecurity environments based on real-world situations.

    This training is conducted in a live and lab-based environment and teaches you to detect and mitigate threat incidents.

What You Learn at Probot Learning:

Schedules

Oops! For this course, there are currently no public schedules available. Clicking on “Notify Me” will allow you to express your interest.

For dates, times, and location customization of this course, get in touch with us.

Who should attend this course?

This course is specially designed for system administrators or network administrators who are planning to advance their careers.

However, the target audience for this training is graduate students who have the in-depth curiosity to start a career relevant to the field of cyber security.

Professionals having 1-2 years of experience in CyberSecurity can boost their career to advance level ISACA Certifications.  

What You Receive at Probot Learning:

Certified Instructor-led training

Industry Best Trainers

Official Training Course Student Handbook

Pre and Post assessments/evaluations

Collaboration with classmates (not available for a self-paced course)

Real-world knowledge activities and scenarios

Exam scheduling support*

Learn and earn program*

Practice Tests

Knowledge acquisition and exam-oriented

Learning Modules

Day 1:

This module describes the structure and capabilities of a SharePoint environment, and the major changes for IT professionals in SharePoint 2016. This module also describes the options available for deploying SharePoint 2016.

  • Key components of a SharePoint deployment
  • New features in SharePoint 2016
  • SharePoint 2016 deployment options

After completing this module, students will be able to:

  • Identify the architecture and capabilities of SharePoint 2016.
  • Identify new and deprecated features in SharePoint 2016.
  • Identify deployment options for SharePoint 2016.

This module describes how to gather business requirements, and the key elements of a successful information architecture project. This module also explains how to structure information within a SharePoint 2016 deployment and make it easy to find and retrieve.

  • Identifying business requirements
  • Understanding business requirements
  • Organizing information in SharePoint 2016
  • Planning for discoverability

Lab: Designing an information architecture – Part one

  • Identifying site columns and content types

Lab: Creating an information architecture – Part two

  • Designing a business taxonomy

After completing this module, students will be able to:

  • Explain how understanding business requirements drives the design of an organizational information architecture.
  • Describe the key components available in SharePoint 2016 to deploy an information architecture.
  • Plan for discoverability as part of an information architecture deployment.
 
  • Detection of network; system incidents, compromise indicators and events along with potential damage assessment
  • Analyze Network Traffic Using Monitors; Detect Malicious Activity AntiVirus; Assess Available Event Information; Baselines for Anomaly Detection;Initial Attack Analysis; Incident Escalation Reporting; Change Implementation Escalation
  • Using Snort and Wireshark to Analyze Traffic; Detect the Introduction and Execution of Malicious Activity; Analyze and Classify Malware Windows Event Log; Manipulation via Windows Event Viewer; Host Data Integrity Baselining; Performing Network Packet Analysis
  •  
  • Execution of incident response plans; mitigation of cyber incidents
  • Defined Response Plan Execution; Network Isolation; Disable User Accounts; Blocking Traffic; Documentation; Incident Report
  • Incident Detection and Identification; Remove Trojan;Block Incoming Traffic on Known Port; Implement Single System Changes in Firewall; Conduct Supplemental Monitoring;Create Custom Snort Rules
 
  • Recovery from incidents; disasters; post incident-response documentation; implementation of continuity plans
  • Industry Best Practices; Disaster Recovery and BC Plans; Cyber System Restoration; Data Backup and Restoration; Actualizing Data Backups and Recovery; Implementing Patches and Updates; Ensuring Data Integrity; Post-Incident Review
  • Comprehensive Lab Response; Patches and Updates; Data Backup and Recovery; Recovering Data and Data Integrity Checks; Post-Incident Service Restoration

Talk to Learning Advisor